I wanted to go over a scenario that arises when you have enterprise licensing for ODI and how this relates to authentication. Specifically, when ODI is authenticated externally. Now, this is not something that most of us EPM developers are used to, but this is standard when BIAPPS is set up. Normally, we would just……

Welcome to Part 1 of a multi-part series detailing the creation of some out-of-the-ordinary processes leveraging Hyperion Planning command-line utilities, new (and old) Essbase CDFs and Hyperion Planning back-end repository tables. In this series, we will look at a requirement that arose at a recent client requiring the ability to update security within a Planning……

As we’ve seen in the last post, we have a list of users and their filter names as they exist in Planning. Continuing on, let’s take a look at what the documentation tells us about filters. It’s not evident at first glance, the importance of the section, “as FILTER-NAME”. If you dig one step deeper,……

Today, I thought we’d look at a little proof of concept, in this part 1 of a 2-part series of posts. One of my co-authors and I were trying to figure out how to replicate security from a Planning application to an Essbase cube. Imagine the scenario, where we might have a planning application, for inputs……